Glossary of Cybercrime-related Terms
See also http://tools.ietf.org/html/rfc4949
- "A" Record
- Access Device Fraud
- Access Control List (ACL)
- Accountability
- Accreditation
- Active Directory
- ActiveX
- Add-on Security
- Address Harvesting
- ADSL
- Adversary
- Adware
- AES (Advanced Encryption Standard)
- Affiliate Program
- AFNIC
- AFS
- Aggregation
- ALG (Application Layer Gateway)
- Algorithm
- Alias
- ANI
- Anonymizer
- Anonymous Login
- ANSI (American National Standards Institute)
- Anycast
- API
- APNIC
- Apple OS X
- Applet
- Application
- APRICOT
- APWG
- Archive
- ARIN
- ARP
- ARPANET
- ASCII
- ASN (Autonomous Sytem Number)
- ASN.1 (Abstract Syntax Notation One)
- Assurance Level
- Asymmetric Cryptography
- Asymmetric Warfare
- ATM
- Attack Signature
- Attack Surface Area
- Attack Vector
- Attachment
- Auction Fraud
- Audit Trail
- AUP
- Authenticate
- Authoritative DNS Servers
- Authorize
- Autocompletion (of fields on web forms)
- Autoresponder
- Availability
- Backbone
- Back Door
- Backups
- Bandwidth
- Banner (warning)
- Banner Advertising
- Bastion Host
- Bayesian Filtering
- BCP38
- Behavior Analysis
- Bell-LaPadula Model
- BGP
- BHO
- BIN (bank identification number)
- Binary
- BIND
- Biometrics
- BIOS
- Bit
- Bittorrent
- Black (e.g., in the Black/Red unclassified/classified dichotomy)
- Blackbox
- Blackhat
- Blackhole
- Blacklist
- Blended Threats
- Block Cypher
- Blog
- Blowfish
- Bluebox
- Bluetooth
- Boot Sector
- Bootstrap
- Bot
- Botnet
- Botherder
- Bounce
- Break (cryptological term)
- Bridge
- British Standard 7799
- Broadband
- Broadcast
- Broadcast Address
- Broken As Designed
- Browser Hijacking
- Browser
- Brute Force Attack
- Buffer Overflow
- Bullet Proof Domain Names
- Bullet Proof Hosting
- Business Continuity Plan
- Byte
- C/C++
- Cable Modem
- Cache
- Cache Poisoning
- CALEA
- Call Back
- CAN-SPAM
- Captcha
- Carding
- Carnivore
- Carrier
- Carrier Hotel
- Cascading Failures
- Cascading Stylesheets
- Castlecops
- CAT5
- ccTLD
- Cell (ATM)
- CERT (Computer Emergency Response Team)
- Certificate
- Certificate Authority
- Certificate Revocation List
- CGI
- Chain of Custody
- Challenge-Response
- Change Management
- Channel
- CHAP (Challenge Handshake Authentication Protocol)
- Chat Room
- Checksum
- CSB (Chemical Safety Board)
- Child Pornography
- CIAC (Computer Incident Advisory Capability)
- CIDR
- CIK (Cryptographic Ignition Key)
- CIO
- Cipher
- Cipher Block Chaining
- Ciphertext
- Circuit Switched
- CIS Benchmarks
- CISO
- Classification Level
- Classified
- Clearance
- Clear Text
- CLI
- Client
- Clipper Chip
- CMYK
- CNAME
- Coax
- COBIT
- Code
- Code Review
- Codec
- Collision
- Colocation Facility
- Command and Control
- Common Criteria
- Common Name
- Community String
- Compartment
- Compromise
- Computer Incident Advisory Capability (CIAC)
- Computer Intrusions
- Computer Network
- COMSEC
- Confidentiality
- Configuration Control
- Contingency Plan
- Control Systems
- Cookie
- Coordinated Universal Time
- COPPA
- Core
- Correctness
- COTS
- Counterfeit Goods
- Countermeasure
- Country Code
- Covert Channel
- CPU
- Cracker
- CRAM (Challenge-Response Authentication Mechanism)
- CRC
- Credential
- Crimeware
- Critical Infrastructure
- Cron
- Cross Site Request Forgeries
- Cross Site Scripting
- Crossover Attack
- Cryptanalysis
- Cryptography
- CSIRT (Computer Security Incident Response Team)
- CSV
- curl
- CVE
- CVV2
- Cyberbullying
- Cyberterrorism
- Cyberwar
- Cyclical Redundancy Check
- Cyphertext
- Daemon
- Darkspace
- DARPA
- Data
- Data Breech
- Data Leak Prevent (DLP)
- Datagram
- DBMS
- DCS (Distributed Control System)
- DDOS
- Deaggregate
- Debugger
- Deception
- Decode
- Decrypt
- Deep Packet Inspection
- Defacement
- Default Username and Passwords
- Defense-In-Depth
- Degausser
- DES
- Device Driver
- DFZ (Default Free Zone)
- DHCP
- Dialer
- Dialup
- Dictionary Attack
- Diffie-Hellman
- Digest
- Digital Certificate
- Digital Signature
- Diploma Scams
- Directory
- Disaster Recovery Plan
- Disclosure
- Disruption
- Distributed Denial of Service Attaack
- Distinguished Name (DN)
- DKIM
- DLL
- DLV
- DMCA
- DMZ
- DN (Distinguished Name)
- DNP
- DNS
- DNSSEC
- DNS-Based Block List
- d00d
- DOCSIS
- Domain
- Domain Control Certificate
- Domain Controller
- Domain Keys
- Domain Name
- Dongle
- DOS
- Dotted Quad
- Download
- Drive-By Download
- DRM
- dsniff
- DS3
- Dumpster Diving
- DVORAK Keyboard
- DWDM
- Dynamic Circuit
- EAP
- Eavesdropping
- eDiscovery
- EFF
- EMEA
- EDNS0
- Egress Filtering
- Electromagnetic Pulse (EMP)
- Emacs
- Email
- Emanations
- Encapsulation
- Encrypt
- End-to-End
- ePending
- Ephemeral Ports
- ERP Systems
- ESSID
- Ethernet
- Ethical Hacking
- EULA
- Evil Twin Wireless Access Point
- Exchange
- Exchange Point
- Exploit Code
- Exponential Backoff
- Extended Validation Certificate
- False Negative
- False Positive
- Fastflux Web Hosting
- Federated Authentication
- FERC (Federal Energy Regulatory Commission)
- FERPA
- File Permissions or Protections
- Finger
- Fingerprint
- Firefox
- Firewall
- Firewire
- Firmware
- FISMA
- Flame
- Flat File
- Flood
- Flow
- Follow the Money
- Forensics
- Fork Bomb
- Fraggle Attack
- Fragment Overlap Attack
- Frame
- Frame Relay
- Free Love
- Front Running
- FTP
- Full Disk Encryption
- Full Duplex
- Fully Qualified Domain Name (FQDN)
- Fuzzing
- Gateway
- Gbps
- Gigapop
- GLBA
- Global Routing Table
- GNU
- GOOSE (Generic Object Oriented Substation Events)
- GPG
- Greyhat
- Grooming
- gTLD
- GUI
- Hackers
- Half Duplex
- Harden
- Hardware Cryptographic Token
- Hash Function
- Header
- Heuristic Detection
- Hexadecimal
- High Yield Investment Program (HYIP)
- Hijacking Address Space
- HIPAA
- HMI (Human Machine Interface)
- Hoax
- Homograph Attack
- Honeymonkey
- Honeypot
- Hop
- Host
- Hosts File
- Hot Site
- Hot Spot
- Hotfix
- HTML
- HTTP
- Hub
- H323
- IANA
- ICANN
- ICCP (Inter-Control Center Protocol)
- ICMP
- ICRA
- ICS (Industrial Control System)
- ICS-CERT (Industrial Control Systems - CERT)
- ICSJWG (Industrial Control Systems Joint Working Group)
- Identity Theft
- IdM
- IE
- IEC 60870
- IEC 61850
- IEC 62351
- IED (Intelligence Electronic Device)
- IEEE
- IESG
- IETF
- IMAP
- Immigration and Customs Enforcment (ICE)
- IN-ADDR
- Incident Handling
- Inference Attack
- Input Validation Attack
- Insider Threat
- Instant Messaging
- Integrity
- Interface
- InterNIC
- Intranet
- Internet
- Internet Protocol
- Internet Transparency
- Internet2
- Interrupt
- Intrusion Detection System
- IOS
- IP
- IP Address
- IPsec
- IPTV
- IPv4
- IPv6
- IRC
- ISAC
- ISATAP
- ISC2 Common Body of Knowledge
- ISDN
- ISIS
- Island of Trust
- ISO
- ISO 17799
- ISO 27002
- ISP
- ITAR
- ITIL
- Java
- Javascript
- Jitter
- Joe Job
- John the Ripper
- JPNIC
- Jumbo Frames
- Kbps
- Kerberos
- Keylogger
- KVM
- LACNIC
- Lambda
- LAN
- Last Mile
- Latency
- Layer 0
- Layer 1
- Layer 2
- Layer 3
- LDAP
- Leaching
- Least Privilege
- Leetspeak
- Library
- Limewire
- Link Spam
- Linux
- LINX
- Listserv
- Load Balancing
- Location Based Services
- Loopback Address
- Loss
- Lynx
- MAAWG
- MAC Address
- Mailbombing
- Majordomo
- Malware
- Man-in-The-Middle (MITM) Attack
- Managed System
- Map a Network
- Masquerade Attack
- Mbps
- MBSA
- MD5
- Media Gateway Control Protocol
- Mesh Network
- Messsage Signing
- Metasploit
- Metatags
- MIB
- Microsoft Windows
- Middlebox
- MIME
- Mirror
- MLM
- MODBUS
- Modem
- Money Laundering
- Monoculture
- Morris Worm
- Mousetrapping
- MPAA
- MPLS
- MTA
- MTU
- MUA
- Mule
- Multicast
- Multihomed
- Multimode Fiber
- MX Record
- NAC
- Nameserver
- NANAE
- NANOG
- National Center for Missing and Exploited Children (NCMEC)
- National Lambda Rail (NLR)
- NDN
- NERC (North American Electricity Reliability Council)
- Nessus
- Net Neutrality
- Netflow
- Netmask
- NetStumbler
- Network Address Translation (NAT)
- Network Anomaly Detection
- Network Operations
- NFS
- nfsshell
- Nigerian Advance Fee Fraud (4-1-9)
- NIST
- NMAP
- NNSB (National Nuclear Safety Board)
- NOC
- Non-delivery Notice
- Non-kinetic Warfare
- Non-printable Characters
- Non-repudiation
- NRC (Nuclear Regulatory Commission)
- NSA
- NSEC3
- NSP
- NTP
- OC3
- OC12
- OC48
- OC192
- OC768
- OCR
- Octet
- OEM
- OID
- One-Time Pad
- One-Time Password
- Onion Routing
- Online Gambling
- Online Payment System
- OPC (OLE for Process Control)
- Open Redirectors
- Open Source Software
- OpenVMS
- Opera
- Operating System
- Opt-In
- Opt-Out
- OSI Model
- OSPF
- Outlook/Outlook Express
- PA (Provider Assigned) Address Space
- Packer
- Packet
- Packet Over Sonet
- Packet Switched Network
- PAP
- Parallel
- Partition
- Password
- Password Cracking Tool
- Password Escrow
- Password Sniffing
- Patch
- Patriot Act
- Pay-Per-Click Fraud
- Payload
- PBL
- PCI Security Standards
- PDF
- PEAP
- Peer-to-Peer Filesharing
- Peering
- Pen Register
- Penetration Testing
- Perl
- Personally Identifiable Information (PII)
- PGP
- Pharming
- Phishing
- Phone Phreaking
- PHP
- Physical Security
- PI (Provider Independent) Netblock
- Pine
- Ping
- Ping of Death
- PIN/TAN System
- Pirated Intellectual Property
- PKI
- Plain Text
- PLC (Programmable Logic Controller)
- Plugin
- Polymorphism
- PNI (Private Network Interconnection)
- Ponzi Scheme
- POP3
- Popunders
- Popups
- Port
- Port Knocking
- Port Scan
- Postscript
- POTS
- PPC (Plant Process Computer)
- PPP
- PPTP
- Prefix
- Prime Bank Scheme
- Private Key
- Private Address Space
- Private Network
- ProfiBUS
- Promiscuous Mode
- Protocol
- Protocol Analyzer
- Provider Independent Address Space
- Proxy
- Public Key
- Pump-and-Dump Stock Fraud
- P3P
- PSTN
- QOS
- QQ
- QWERTY Keyboard
- Race Condition
- Radius
- RAID
- Rainbow Table
- RARP
- RC4
- Recursive DNS Servers
- Red (in the Black/Red unclassified/classified dichotomy)
- Red Teaming
- Regex
- Regional Optical Network
- Registrar
- Registry
- Remailer, Type I/Type II
- Remote Code Execution
- Replay Attack
- Reshipping Fraud
- Resource Exhaustion Attack
- Reverse DNS
- Reverse Engineer
- RFC
- RFC-Ignorant
- RIA
- RIP
- RIR (ARIN, APNIC, RIPE, LACNIC, AFNIC, etc.)
- RIPE
- Risk Assessment
- Root
- Root Kit
- Routing
- rcp
- RSA
- rsh
- RSS
- RTU (Remote Terminal Unit)
- SAMBA
- Sandbox
- SANOG
- SANS
- SBL
- SCADA
- Scavenge
- Scheduled Controlled Substances
- scp
- Screen Saver
- Screen Shot
- Script Kiddy
- Search Engine Optimization (SEO)
- Secunia
- Security Theater
- SenderID
- Separation of Duties
- Serial
- Server
- Service Pack
- Session Timeouts
- Shadow File
- Shell Access
- Shibboleth
- Shoulder Surfing
- Sign
- Signatures
- SIM Card
- Single Mode Fiber
- Single Sign On
- SIP
- SIS (Safety Instrumented System)
- Slashdot
- Small Dollar Amount Fraud
- Smart Card
- Smiley
- S/MIME
- SMS
- SMTP
- Smurfing
- Sniffer
- SNMP
- Snort
- Social Engineering
- Social Networking Sites
- Socket
- SOCKS
- Software Development Lifecycle
- SPA
- Spam
- Spamhaus
- Span Port
- Spanning Tree
- SPF
- SPIM
- SPIT
- Spoofed Traffic
- Spyware
- SQL Injection
- SSH
- SSL
- Sniffing
- Snowshoe Spam
- Social Engineering
- Spam
- Spear Phishing
- Spyware
- Stakkato Intrusions
- Stateful Inspection
- Static Route
- Steganography
- Stepping Stone Attack
- Stream Cipher
- Streaming Video
- Store-and-Forward
- Subnet
- Supplicant
- SURBL
- Swap Space
- Switch
- Switching
- SYN Flood
- Syslog
- T1
- T3
- TACACS
- Tailgate
- TCP/IP
- TCP Fingerprint
- TCP Wrappers
- TDM
- Telepresence
- Telnet
- TEMPEST
- Terabyte
- Terminal
- Text Editor
- The Coroner's Toolkit
- Theft of Services
- Threat Assessment
- Thunderbird
- Tiger Team
- Titan Rain
- Title III Warrant
- TKIP
- TLA
- TLD
- TLS
- Token Ring
- Toolbar
- Topology
- Tor
- Torrent
- TOS
- Traceback
- Traceroute
- Tracking Cookie
- Traffic Analysis
- Traffic Policing
- Traffic Shaper
- Transaction signing
- Transit
- Trap and Trace
- Triple DES (3-DES)
- Triple Play
- TripWire
- Trojan Horse
- Troll
- Trunking
- Trusted Ports
- TSIG
- TTL
- Tunnel
- Two Channel Authentication
- Two Factor Authentication
- Typosquatting
- UDP
- Unicast
- Unicode
- Unified Threat Management (UTM)
- Unix
- Unmanaged System
- Upload
- UPNP
- URI
- URL
- USB
- Usenet
- Username
- UUCP
- UUencode/UUdecode
- van Eck Phreaking
- vi
- Virtual Worlds
- Virtualization
- Virus
- VLAN
- Voice Phishing
- VoIP
- VPN
- Vulnerability
- Walled Garden
- WAN
- War Chalking
- War Dialer
- War Driving
- Warez
- Watermarking
- Web Bug
- Web Redirector
- Web Server
- Web 2.0
- Web-of-Trust
- Website Defacement
- WEP
- wget
- Whitehat
- Whole Disk Encryption
- Whois
- WiFi
- Wiki
- WiMax
- Wire Fraud
- Wired
- Wiretapping
- Workaround
- Worm
- WPA
- WPAD
- WSUS
- WWW
- X Windows
- XBL
- XML
- XSS
- X.509
- Zero Day Exploit
- Zombie
- Zone Enumeration
- 3-way Handshake
- 404
- 802.1q
- 802.11a
- 802.11b
- 802.11g
- 802.11n
See also the list of Internet Slang and Abbreviations that's available
at: http://www.internetslang.com/all.asp
Acknowledgements: Many thanks to those suggesting terms, including
Chas DiFatta (CMU), Michael Van Norman (UCLA), and
Nicholas Lewis (Harvard)